Which of the following protocols uses public-key cryptography to authenticate the remote computer?
A . SSH
B . Telnet
C . SCP
D . SSL
Answer: A
Latest CISSP-ISSAP Dumps Valid Version with 237 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund